Asymmetric encryption

Keyboard Shortcuts

Lisa Bock discusses asymmetric encryption and the many uses that include key exchange, confidentiality using encryption, authentication functions using the Public Key Infrastructure (PKI), and creating digital signatures.

- [Narrator] Symmetric encryption provides fast,…efficient encryption.…However it requires both the sender…and receiver have the same shared key,…which can be a problem in a complex networked environment.…Asymmetric encryption is also called public key encryption…and it uses two keys that are mathematically related.…A public key that you publish and share,…and a private key that you keep private.…

Scientists developed asymmetric encryption in the 1970s…as a need for securely exchanging a secret key…became evident.…Let's step through the process of encrypting data…that only Bob should see using asymmetric encryption.…We start with Alice sending a secret message to Bob…with plain text input.…And now, we take Bob's public key…and the encrypting algorithm.…It then becomes cipher text.…

It's sent to Bob who uses Bob's private key…and the decryption algorithm…it then becomes plain text output,…and because only Bob has Bob's private key,…only Bob can see the contents.…Asymmetric or public key encryption algorithms…include RSA or PGP.…

Resume Transcript Auto-Scroll

Author

Released

9/21/2017

Earning a Cisco Certified Network Associate (CCNA) Security certification demonstrates that you have the specialized knowledge needed to secure Cisco networks. Join Lisa Bock as she prepares you to tackle the Security Concepts portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. In this course Lisa covers essential security terms, and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers.